|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4419-1325-8 |
003 |
DE-He213 |
005 |
20220116161829.0 |
007 |
cr nn 008mamaa |
008 |
100301s2010 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781441913258
|9 978-1-4419-1325-8
|
024 |
7 |
|
|a 10.1007/978-1-4419-1325-8
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security Informatics
|h [electronic resource] /
|c edited by Christopher C. Yang, Michael Chau, Jau-Hwang Wang, Hsinchun Chen.
|
250 |
|
|
|a 1st ed. 2010.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2010.
|
300 |
|
|
|a VI, 206 p. 60 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Annals of Information Systems,
|x 1934-3213 ;
|v 9
|
505 |
0 |
|
|a Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement -- Patterns of Word Use for Deception in Testimony -- Information Integration for Terrorist or Criminal Social Networks -- Processing Constrained k-Closest Pairs Queries in Crime Databases -- What-If Emergency Response Through Higher Order Voronoi Diagrams -- Identity Management Architecture -- A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems -- ETKnet: A Distributed Network System for Sharing Event Data and Multi-faceted Knowledge in a Collaboration Federation -- Duplicate Work Reduction in Business Continuity and Risk Management Processes.
|
520 |
|
|
|a Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Business information services.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Operations research.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT in Business.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Operations Research and Decision Theory.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
650 |
2 |
4 |
|a Artificial Intelligence.
|
700 |
1 |
|
|a Yang, Christopher C.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Chau, Michael.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, Jau-Hwang.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Chen, Hsinchun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441913357
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441913241
|
830 |
|
0 |
|a Annals of Information Systems,
|x 1934-3213 ;
|v 9
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4419-1325-8
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|